Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fluent Bit Vulnerabilities Expose Cloud Services to Takeover

Posted on November 25, 2025November 25, 2025 By CWS

5 vulnerabilities within the well-liked Fluent Bit open supply device might permit attackers to take over cloud providers, Oligo Safety warns.

The light-weight, extremely scalable knowledge agent helps the gathering, processing, and forwarding of logs, metrics, and traces. It’s extensively used as an ordinary in observability pipelines throughout cloud environments and container orchestration platforms.

Fluent Bit is constructed round enter plugins that collect knowledge from varied sources, and output plugins that ship it to specified locations. For identification functions, every report carries a tag that additionally acts as a routing label.

Tracked as CVE-2025-12972 and described as an absence of sanitization of tag values which can be used to generate filenames, the primary of the newly disclosed bugs permits attackers to inject path traversal sequences.

This allows attackers to overwrite arbitrary information on disk, resulting in log tampering and distant code execution (RCE), Oligo explains. Configurations the place an outlined ‘File’ key’s lacking from the file output are affected.

The second difficulty, CVE-2025-12970, a stack-based buffer overflow within the Docker enter, permits attackers to create containers with extraordinarily lengthy names that exceed the allotted mounted 256-byte buffer, resulting in crashes and code execution. Solely setups with the Docker enter are affected.

The third vulnerability, tracked as CVE-2025-12978, permits attackers to spoof trusted tags by guessing the primary character of a tag key in HTTP, Elasticsearch, and Splunk inputs. This might result in log rerouting, filter bypasses, and the injection of malicious or modified information.

The fourth bug, CVE-2025-12977, exists as a result of tags derived from user-controlled fields bypass sanitization, permitting attackers to inject characters and sequences resulting in log corruption or broader output-based assaults. It impacts HTTP, Elasticsearch, and Splunk configurations.Commercial. Scroll to proceed studying.

Tracked as CVE-2025-12969, the fifth flaw exists as a result of, when configured with Safety.Customers, Fluent Bit forwarders silently disable authentication. Distant attackers can exploit the difficulty to inject false telemetry, ship logs, or flood detection programs.

Given Fluent Bit’s widespread presence throughout AWS, Google Cloud, Microsoft Azure, AI labs, monetary providers, and extra, the newly recognized safety defects pose a vital threat to the cloud ecosystem, as they might permit attackers to trigger disruptions and acquire deep entry to infrastructure, Oligo says.

“In observe, this implies an attacker exploiting these vulnerabilities couldn’t solely disrupt cloud providers and tamper with knowledge, but in addition take over the logging service itself,” the safety agency notes, warning that CVE-2025-12972 was launched eight years in the past.

The safety defects have an effect on Fluent Bit variations previous to 4.1.1 and 4.0.12. Updating to essentially the most steady launch resolves all vulnerabilities.

Oligo additionally notes that it reported the bugs to AWS, which instantly addressed them by migrating to Fluent Bit model 4.1.1.

Associated: CISA Confirms Exploitation of Current Oracle Identification Supervisor Vulnerability

Associated: SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability

Associated: Vulnerability Allowed Scraping of three.5 Billion WhatsApp Accounts

Associated: Current 7-Zip Vulnerability Exploited in Assaults

Security Week News Tags:Bit, Cloud, Expose, Fluent, Services, Takeover, Vulnerabilities

Post navigation

Previous Post: WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation
Next Post: Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely

Related Posts

Akira Ransomware Group Made $244 Million in Ransom Proceeds Security Week News
Godfather Android Trojan Creates Sandbox on Infected Devices Security Week News
Organizations Warned of Exploited PaperCut Flaw Security Week News
ThreatSpike Raises $14 Million in Series A Funding Security Week News
West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • #1 Gap in Your SOCs Is Probably Not What You Think 
  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • Fluent Bit Vulnerabilities Expose Cloud Services to Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • #1 Gap in Your SOCs Is Probably Not What You Think 
  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • Fluent Bit Vulnerabilities Expose Cloud Services to Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark